Skip to main content

An official website of the United States government

  1. Home
  2. Trade
  3. Cybersecurity Resiliency

Cybersecurity Resiliency

Global supply chains are increasingly interconnected, technology-enabled, and efficient, allowing businesses and consumers to access an unprecedented amount of goods quickly. These supply chains rely on technology to facilitate the movement of cargo and transmit data to U.S. Customs and Border Protection (CBP) for cargo clearance.

Several high-profile cyberattacks against trade entities demonstrate that supply chains can be disrupted, which may impact not only the economy, but also the efficient flow of critical products to consumers across the country. As supply-chain disrupting cyberattacks expand in complexity and frequency, CBP is committed to working with the trade community to enhance efforts to prevent and mitigate the impacts of future disruptions.

This page is a resource to help the trade community better prepare for potential cyberattacks.

 


What to do if You’re Experiencing a Cyberattack

If you suspect that your systems have been targeted by a cyberattack, please follow the steps below:

How to Identify a Cyberattack with Indicators of Compromise

An Indicator of Compromise (IOC) is forensic evidence on a computer or network that indicates the security of the network has been breached. IOCs act as flags that cybersecurity network administrators use to detect unusual activity that usually suggests an attack is in progress. IOCs also provide insight into actors’ intent and can provide early warning signs of possible future attacks.

  • Unusual inbound or outbound network traffic

    If inbound or outbound network traffic patterns are unusual, this can be indicative of a potential attack.

  • Anomalies in privileged user account activity

    If user account anomalies are identified, this could indicate that a user is trying to escalate the privileges of a particular account.

  • Geographical irregularities

    If network activity occurs outside of your company’s geographic location(s), this can be evidence of a cyber threat actor in another country trying to penetrate the system.

  • Increase in database read volume

    If an attacker tries to extract your data, their efforts may result in a swell in read volume.

For more information on Indicators of Compromise, please see the IOC Reporting Guidance document.


What to do if Your Cargo is Impacted by a Cyberattack

Downtime and enforcement discretion may be authorized by CBP Headquarters on a case-by-case basis.

Downtime refers to alternative cargo release processes which are authorized based on a determination by CBP OFO. Downtime may be authorized by CBP OFO when a cybersecurity incident prevents a broker from electronically filing in the Automated Commercial Environment (ACE) the entry documentation and information required by 19 C.F.R 142.3 to secure cargo release from customs custody on behalf of the broker’s clients.

Enforcement discretion refers to a determination made by OT and OFO that CBP will not issue or enforce certain liquidated damages claims. Enforcement discretion may be authorized by CBP when a cyberattack prevents a broker from filing the entry summary documentation and information, completing the deposit of estimated duties, taxes, and fees, and/or completing timely other post-release transactions on behalf of the broker’s clients.

See Broker Cybersecurity Incident Procedures for guidance on how to request and navigate Downtime and Enforcement Discretion as well as requirements for reporting entry transactions during and after the cyberattack.

 

Contact the SOC

Last Modified: Aug 02, 2024